1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
3 years ago
9

Which of the following accurately describe the

Computers and Technology
2 answers:
tatyana61 [14]3 years ago
6 0

Answer:

A C D on edge

Explanation:

Ronch [10]3 years ago
3 0

Answer:

I can get a few months ago but the other use of the way you can you are you have a few weeks ago

You might be interested in
How are people using lying today? What are the types of lying? Describe each type.
Alborosie
Lol what ever you are taking i want to take it right now 

6 0
4 years ago
Which is a guideline for conducting technical reviews?
olasank [31]

A guideline for conducting technical reviews is to be sure team members have identical skillsets.

<h3>What is Technical review?</h3>

Technical review is a term that connote the application of scientific, engineering, or other form of expertise to know if activity for which a permit is requested attain the standards for giving the permit under the required statute and rule.

Therefore, A guideline for conducting technical reviews is to be sure team members have identical skillsets.

See options below

Which is a guideline for conducting technical reviews?

be sure team members have identical skillsets

involve people from different backgrounds

omit domain experts on the review team

Learn more about guideline from

brainly.com/question/17711902

#SPJ11

7 0
2 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
In 2-4 sentences, explain the difference between the “save” and the “save as” commands.
yuradex [85]
The "save" command means to save it again, or to save the changes you made to an already saved document. The "save as" command means to save it for the first time and you enter in what you want to name to document youre saving
4 0
4 years ago
Read 2 more answers
Write a python coding to input ten random numerical vales to a list. And display the list. Use a loop structure to enter values.
Zarrin [17]

Answer:

000110011111000010010101001001

Explanation:

8 0
3 years ago
Other questions:
  • You should code width and height dimensions for images because:
    15·1 answer
  • In which of the following situations will a macro make your work more efficient?
    12·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • In 4-bit two's complement representation, what is the binary encoding of the number -5?
    8·1 answer
  • What permission do users have by default regarding printer access and the ability to manage documents?
    14·1 answer
  • Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. Given a variable modelYear write a statement that prin
    9·1 answer
  • (1) The Format Painter ___.
    5·1 answer
  • WILL GIVE BRAINLIEST!!! Danielle is warehouse supervisor for a large shipping company. Most shipments need to leave the warehous
    7·1 answer
  • Significant design efforts, during deliberate planning at combatant commands, produce results as those commands _____. (Select a
    5·1 answer
  • Windows organizes the folders and files in a hierarchy, or ______​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!